Made4Biz Security Inc -  Dynamic Security


Dynamic Security (DS) implements convergent physical and ICT security ‎technology. It gives you a total solution that provides organizational security and risk ‎mitigation at levels that were not previously possible.    

Dynamic Security allows you to:

  • Meet increasing security threats from new technologies such as Wi-Fi.

  • Automate tedious, repetitive security administration tasks for better utilization ‎of your security staff and improved security service level.

  • Implement location-based security - access rights depend on physical ‎presence.

  • Integrate standalone products into a convergent unified security process.

  • Comply with regulations and standards such as Sarbanes-Oxley.

  • Replace static security with dynamic convergent security. Access rights and ‎incident management depend on physical presence and alert levels.

The security challenge

According to ASIS, theft of proprietary information has cost over $50 billion annually in recent years. Identity theft has been singled out as a major concern by US GAO report GAO-02-363.

Increasingly, firms are looking to convergent security solutions that integrate physical and ICT security. Forrester estimated that in 2005, firms would treble spending on integration of physical and IT security systems. Physical Access Control, CCTV, RFID and others will be integrated with Single Sign-On, Identity Management, and security incident management into one holistic security process.

Meeting the challenge: Convergent Dynamic Security

Until the introduction of Dynamic ICT Security, static security products provided the only practical way to implement data security. Their limited capabilities exposed you to a wide range of security risks. Why leave security profiles intact, even when employees are on vacation or traveling? Dynamic ICT Security, acting as an automated administrator, prevents such unnecessary exposures by implementing location based security.

Dynamic  Security (D-DS) helps you meet the challenge of security convergence. Dynamic  Security acquires physical security information, such as entry and exit of employees to the plant or secure areas, and IT events such as employees logging onto their workstations. DS limits access rights according to dynamically configured security policies. It recognizes suspicious usage patterns, such as attempts to log in using the identities of absent employees, and implements automated security incident management, including barring of access and appropriate alerts and log entries.




  • Dynamic, rather than static, Location-based Security

  • Physical port security

  • Access management

  • Asset management

  • Security policy management

  • Internal and external identity theft prevention

  • Regulatory and standards compliance:

  • Sarbanes-Oxley


  • ISO 17799

  • Security for Wi-Fi networks

  • Desktop burglary sensor

  • Alignment of policies with Homeland Security (DHS) threat advisory levels


  • Policy-based security - Flexible policy engine automates policy-based security, based on  physical presence, threat levels and business rules.

  • Location-based security - Access rights depend on user's location

  • Temporal based security - Access policies change in off-hours.

  • Role-based security - Rights are administered by role.

  • Security Syndication - Pool data from multiple sites to detect attack preparations.

  • Automated Security Business Process Management (BPM) integrates security incidents and information that originated in disparate security products. D-ICT implements Security Administration Automation.

  • Physical-ICT Convergence - Isolated islands-of-technology converge into a singe coherent security system.

  • Dynamic Provisioning of access rights.

  • Open Architecture -  Standards-based technology seamlessly integrates with installed physical and IT security management systems. Made4biz Security products support industry standards including SAML, Physbits and Sox.

  • Web Service and Service Oriented Architecture (SOA) based.

  • Intelligent System - Correlation and Pattern Recognition correlates events related to physical presence and network access.

  • Alarms - triggers alarms and prevents unauthorized use of ICT resources.

  • Dynamic Forensic based Investigations (D-FBI) option- integrates forensic database and uses it in decision making.

  • Dynamic Security Operation Console (D-SOC) puts all the information and control in one place:

  • Rapid visualization of alerts

  • Structured logs

  • Integration of stand alone security products



Home - Dynamic Security | Privacy Policy | Copyright and Trademark Info